Movatterモバイル変換


[0]ホーム

URL:


US9129270B2 - Portable E-wallet and universal card - Google Patents

Portable E-wallet and universal card
Download PDF

Info

Publication number
US9129270B2
US9129270B2US12/715,977US71597710AUS9129270B2US 9129270 B2US9129270 B2US 9129270B2US 71597710 AUS71597710 AUS 71597710AUS 9129270 B2US9129270 B2US 9129270B2
Authority
US
United States
Prior art keywords
card
mobile device
universal
data
universal card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/715,977
Other versions
US20110218911A1 (en
Inventor
Douglas Spodak
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GONOW TECHNOLOGIES LLC
Original Assignee
GONOW TECHNOLOGIES LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GONOW TECHNOLOGIES LLCfiledCriticalGONOW TECHNOLOGIES LLC
Priority to US12/715,977priorityCriticalpatent/US9129270B2/en
Assigned to DIGITAL LIFE TECHNOLOGIES, LLCreassignmentDIGITAL LIFE TECHNOLOGIES, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SPODAK, DOUGLAS
Assigned to LERNER, STEVENreassignmentLERNER, STEVENSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DIGITAL LIFE TECHNOLOGIES, LLC, SPODAK, DOUGLAS
Publication of US20110218911A1publicationCriticalpatent/US20110218911A1/en
Priority to US13/310,491prioritypatent/US8788418B2/en
Priority to US13/359,352prioritypatent/US9195926B2/en
Priority to US13/438,131prioritypatent/US8671055B2/en
Assigned to DIGITAL LIFE TECHNOLOGIES, LLCreassignmentDIGITAL LIFE TECHNOLOGIES, LLCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: LERNER, STEVEN
Priority to US13/630,248prioritypatent/US9218557B2/en
Priority to US13/644,714prioritypatent/US9129199B2/en
Priority to US13/717,363prioritypatent/US9177241B2/en
Priority to US13/836,864prioritypatent/US9317018B2/en
Priority to US14/157,423prioritypatent/US9218598B2/en
Assigned to GONOW TECHNOLOGIES, LLCreassignmentGONOW TECHNOLOGIES, LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: DIGITAL LIFE TECHNOLOGIES LLC
Priority to US14/843,865prioritypatent/US9734345B2/en
Publication of US9129270B2publicationCriticalpatent/US9129270B2/en
Application grantedgrantedCritical
Priority to US15/131,437prioritypatent/US9904800B2/en
Priority to US15/842,641prioritypatent/US20180114036A1/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card.

Description

TECHNICAL FIELD
The presently disclosed subject matters relates to universal cards, mobile applications, and mobile devices such as mobile phones, Personal Digital Assistants (PDAs), iPods, and similar mobile devices. More particularly, the subject matter relates to a universal card which can be used at any type of terminal equipped with a magnetic stripe reader or a short range wireless communication capability.
BACKGROUND
People carry many types of cards with them every day. The cards include credit cards, debit cards, drivers' licenses, transportation passes, building access cards, and many other types of cards. These cards are typically carried in a wallet or purse. A person may need to use any number of cards during the course of a day. Since people do not know which of the cards will be needed on any given day, most people carry all the cards that they may need with them every day. With the proliferation of card-capable terminals, people can end up carrying an inordinate amount of cards with them every day.
Many people also carry mobile devices with them, such as cell phones, PDAs, and many other types of mobile devices. Mobile devices increasingly have short range communication capabilities, such as near field communication (NFC) capabilities or Bluetooth capabilities.
A person that carries a wallet or purse also has to secure the contents of the wallet or purse at all times to protect against theft and fraud. If a card is lost or stolen, it can be used in unauthorized ways, leading to identification theft, fraud, or financial loss. In addition, as many transactions are increasingly performed without the need for physically possessing the card (e.g., online purchases), the mere exposure of the information found on a card to an unauthorized person is a risk to the card holder.
There is a need to reduce the number of cards carried by a person, and an opportunity to address that need using the short range communication capabilities of a mobile device which that person carries. In addition, there is a need to secure cards and card information so that cards and card information is not exposed to unauthorized people.
SUMMARY
To reduce the number of cards carried by a person, a universal card and short range communication enabled mobile device can be used in place of all the other cards which the person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card, such as emulating the magnetic stripe of the traditional card, the NFC communication of the traditional card, the radio transmission of the traditional card, or any other function.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing Summary, as well as the following Detailed Description, is better understood when read in conjunction with the appended drawings. In order to illustrate the present disclosure, various aspects of the disclosure are shown. However, the disclosure is not limited to the specific aspects shown. The following figures are included:
FIG. 1 depicts an exemplary system including a mobile device and a universal card.
FIG. 2 depicts a traditional card with a static magnetic stripe.
FIG. 3 depicts a flowchart process for programming a universal card.
FIG. 4 depicts interactions between a mobile device and a universal card, and between a universal card and three different types of terminals.
FIG. 5 depicts an exemplary system including a personal computer, a mobile device, and a universal card.
FIG. 6 depicts a flowchart process for managing universal card data using a mobile device.
FIG. 7 depicts a flowchart process for managing universal card data using a personal computer.
FIGS. 8A,8B,8C, and8D depict possible designs for the front of a universal card.
FIG. 9 depicts a possible design for the back of a universal card.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
Referring toFIG. 1, an exemplary system is depicted with amobile device100 and auniversal card110. Themobile device100 can be any number of devices, including a cell phone, a PDA, an iPod, an NFC-specialized device, or any other type of mobile device. An NFC-specialized device is a device that provides for the user to be able to communicate with NFC terminals, such as making a contactless payment, and would also provide a user with a user interface for interacting with an NFC-enabled universal card. Themobile device100 may include any number of components, such as aprocessor101,memory102, apower source103, auser interface104, and ashort range transceiver106.Memory102 can be any type of computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) and random access memory (RAM).Processor101 can operate on data and/or software applications available in thememory102. Theuser interface104 can include any components for user input, such as a keyboard, a mouse, a trackball, a touch screen display, or any similar component. Theuser interface104 can also include security features on the mobile device, such as a PIN/password login, a fingerprint scanner, other biometric readers, or similar security features.
Themobile device100 also includes ane-wallet application105 which is executable by theprocessor101. Thee-wallet application105 can be pre-installed on themobile device100 by the manufacturer of themobile device100. Thee-wallet application105 can also be installed by the user either by downloading it directly to themobile device100, by downloading thee-wallet application105 over-the-air via a wireless data connection, or by inserting a memory card containing thee-wallet application105.
Thee-wallet application105 allows the user to input information about traditional cards for storage in thememory102. Information about traditional cards can include an account name, an account number, an expiration date, a card verification value 2 (CVV2), the image of the traditional card, the information which would be stored on the magnetic stripe of the traditional card, and any other information necessary to emulate the card. The information about traditional cards can also be stored in a remote location, such as a trusted service manager (not shown), which stores the information and provides the information to themobile device100 on demand via wireless data communication. In this case, thee-wallet application105 would interface with the remote location to request and receive the information.
Thee-wallet application105 can also be used to program theuniversal card110 by allowing the user to select a traditional card for the universal card to emulate. Once the user selects a card for emulation, thee-wallet application105 causes the mobile device to communicate with the universal card and to transmit the information necessary for the universal card to emulate the selected traditional card.
In another universal card embodiment, the information about the traditional card could be stored in thememory115 of theuniversal card110. In this embodiment, if theuniversal card110 has a user interface with sufficient capabilities, the user may be able to program the card by using the user interface on theuniversal card110.
Theshort range transceiver106 can be configured to communicate via any type of short range communication link, such as an NFC communication link or a Bluetooth communication link. Themobile device100 may be manufactured with theshort range transceiver106. However, not all mobile devices are initially manufactured with short range transceivers. Theshort range transceiver106 may be located on a memory card compatible with a memory slot of themobile device100. In this situation, the memory card with theshort range transceiver106 is inserted into the memory slot (not shown) of themobile device100 such that the mobile device can transmit and receive information using a short range communication link corresponding to theshort range transceiver106.
Another issue with theshort range transceiver106 may arise if theshort range transceiver106 of the mobile device and theshort range transceiver116 of theuniversal card110 are not configured for the same type of short range communication. For example,mobile device100 may have a Bluetooth transceiver, and theuniversal card110 may have an NFC transceiver. In such a situation, theshort range transceiver106 would be a two-type transceiver, capable of communicating via both types of short range communication. In the example above, theshort range transceiver106 would be capable of receiving information via the Bluetooth link from themobile device100, and also capable of sending that information via the NFC link to theuniversal card110. Theshort range transceiver106 would also be capable of communicating in the opposite direction, receiving information via the NFC link from theuniversal card110 and sending that information via the Bluetooth link to themobile device100. One example of a two-type transceiver is a MyMax sticker produced and sold by TwinLinx of France. The MyMax sticker can be attached to the housing of a Bluetooth-enabled device, can communicate with the device via a Bluetooth connection, and can communicate via an NFC connection with an NFC-enable device.
Also depicted inFIG. 1 is auniversal card110. Theuniversal card110 may include components such as adisplay112, apower source113, aprocessor114, andmemory115. Each of those components are similar in function to the corresponding components of themobile device100, except that the component of theuniversal card110 may be physically configured differently so as to fit in the shape of theuniversal card110. For example, thedisplay112 of theuniversal card110 may be integrated intouniversal card110 via hot lamination processes and standard inlay constructs so that theuniversal card110 will be the approximate shape and size of a traditional credit card and generally compliant with ISO 7810 standards.
Theuniversal card110 may also include a dynamicmagnetic stripe111 which can be configured to emulate the magnetic stripe of any traditional card. The standard magnetic stripe format is defined by ISO/IEC 7810:2003, and its extensions, including ISO/IEC 7811-1:2002 through ISO/IEC 7811-9:2008, and ISO/IEC 7813:2006, each of which are hereby incorporated by reference. Traditional magnetic stripes include a series of tiny bar magnets which can be magnetized in either a north- or south-pole direction. When the polarity of the bars aligns in the same direction, the card is blank. To write data to the card, the polarity of a bar is reversed so that the north pole is facing the north pole of the adjacent bar (N-N) or the south pole is facing the south pole (S-S). This causes a change in the magnetic field that can be detected by a card reader. The two possible flux reversals, N-N or S-S, can represent two different information states, which corresponds nicely to the binary system (ones and zeros) used by computers.
Magnetic stripes have three standard track layouts: Track 1, Track 2, and Track 3. Referring toFIG. 2, depicted is atraditional card201 with a staticmagnetic stripe202. The static magnetic stripe includes each of Tracks 1, 2, and 3, shown as203,204, and205, respectively. Each of the track layouts are 0.110 inches high. Track 1 has 210 bits per inch (bpi) with room for 79 characters of 7 bits each (6 data bits, plus 1 parity bit). Track 2 has 75 bpi with room for 40 characters of 5 bits each (4 data bits, plus 1 parity bit). Track 3 has 210 bpi with room for 107 numeric digits. Tracks 1 and 2 have a standard for the data content contained in each track. Those standards are shown in Tables 1 and 2 below. In contrast, Track 3 does not have a standard for the data content in the track, and can be used for proprietary data formats.
TABLE 1
Standard Track 1 Data Content in Magnetic Stripe of Financial Cards
Data FieldContent of Data Field
Start sentinel1 byte (the % character)
Format code1 byte alpha (“A” is reserved for proprietary use of the card
issuer; “B” is a standard for financial institutions; “C”-“M”
are reserved for use by ANSI; and “N”-“Z” are
available for use by individual card issuers)
Primary Account numberUp to 19 characters
Separator1 byte (the {circumflex over ( )} character)
Country code3 bytes (optional)
SurnameVariable number of bytes
Surname separator1 byte (the/character)
First name or initialVariable number of bytes
Space1 byte (used only when more data follows the first name or
initial)
Middle name or initialVariable number of bytes
Period1 byte (the. character; used only when followed by a title)
TitleVariable number of bytes (optional)
Separator1 byte (the {circumflex over ( )} character)
Expiration date or separator4 bytes (YYMM format), or a 1-byte separator if non-expiring
card
Discretionary dataVariable number of bytes (optional; can be used by the card
issuer)
End sentinel1 byte (the ? character)
Longitudinal redundancy check1 byte
TABLE 2
Standard Track 2 Data Content in Magnetic Stripe of Financial Cards
Data FieldContent of Data Field
Start sentinel1 byte (the; character)
Primary account numberUp to 19 bytes
Separator1 byte (the = character)
Country code3 bytes (optional)
Expiration date or separator4 bytes (YYMM format), or a 1-byte separator if non-expiring
card
Discretionary dataVariable number of bytes (optional; can be used by the card
issuer)
End sentinel1 byte (the ? character)
Longitudinal redundancy check1 byte
Traditional financial cards from the banking industry, such as credit cards and debit cards, typically use both Tracks 1 and 2, with Track 2 using format code “A” or “B”. Some traditional credit and debit cards do not have Track 3 physically present on the cards as its data is not necessary for the cards' use. Eliminating Track 3 can reduce the physical size of the magnetic stripe. Traditional financial cards usually include all of the data listed in Tables 1 and 2.
Traditional gift cards typically use Track 2 with format code “B”. Those cards usually have a unique account number, but usually do not contain the name of the user in the track. Some traditional gift cards can include the amount available at the time of the original purchase in the magnetic track, and some will store the current balance on the card so that the card can be used at any terminal. However, most traditional gift cards do not have any value data stored on the card; the card merely stores the unique account number, and each terminal at the store is connected to a database, where the value of the card is associated with the unique account number.
Traditional loyalty cards typically use Track 2 with format code “B”. Like traditional gift cards, traditional loyalty cards typically include only a unique account number without storing any data about the user or any monetary value associated with the card. Most terminals which accept loyalty cards are connected to a central database which associates data about the user with the unique account number. Some traditional loyalty cards also include a barcode printed on the face of the card so that the card can be read by a barcode scanner. The barcode is representative of the unique account number of the user, and typically has no other data encoded in the barcode itself.
Many driver's licenses issued in the United States have a magnetic stripe on them. Driver's licenses typically include Tracks 1, 2, and 3. The data content of Tracks 1 and 2 are shown in Table 3. The data content of Track 3 is not entirely standardized, but Track 3 typically includes at least some of the following data categories: template number, security number, postal code, class, restrictions, endorsements, sex, height, weight, hair color, eye color, ID number, error correction, and security field.
TABLE 3
Standard Track 1 and Track 2 Data Content of US Driver's Licenses
Track 1 Data FieldsContent of Data Field
Start sentinel1 character (usually the % character)
State or province2 characters
CityUp to 13 characters (variable length)
Field separator1 character (usually the {circumflex over ( )} character),
unless the City field is maxed out
Last nameVariable length
Field separator1 character (usually the $ character)
First nameVariable length
Field separator1 character (usually the $ character)
First nameVariable length
Field separator1 character (usually the {circumflex over ( )} character)
Home addressVariable length (usually house number and street)
Field separator1 character (usually the {circumflex over ( )} character)
Discretionary dataVariable length
Start sentinel1 character (usually the {circumflex over ( )} character)
Track 2 Data FieldsContent of Data Field
ISO issuer ID number6 character
License/ID number8 character
Field separator1 character (usually the = character)
Expiration date4 characters (usually YYMM format)
Birth date8 characters (usually YYYYMMDD format)
License/ID numberVariable length
overflow
Traditional access cards are used to provide access to the card holder to a building or other secure area. Traditional access cards typically use either a magnetic stripe or a radio transmitter to convey information to a terminal. When using a magnetic stripe, the data encoded on the magnetic stripe typically includes the user's name, an ID number associated with the user, and an access level relating to where and when the user is allowed access. When using a radio transmitter, the access card typically only includes an ID number associated with the user, and the access terminal is connected to a database which contains information about the user and the access level based on the ID number. Radio transmitters in access cards can either be “active” radio transmitters (powered by a power source on the card), or “passive” radio transmitters (powered by the radio receiver in the terminal when the card is brought into close proximity with the terminal).
Referring back toFIG. 1,universal card110 can also include aradio communications apparatus117 to emulate an access card which uses a radio communications apparatus.Radio communications apparatus117 can either be a passive radio transmitter, or an active radio transmitter powered bypower source113. The ID number transmitted by theradio communications apparatus117 can be programmed so that the universal card can programmed to emulate different traditional access cards. When programming theuniversal card110 to emulate an access card, it may be desirable to verify the identity of the user prior to programming theuniversal card110. Examples of user verification are discussed below.
Other types of traditional cards exist and can be emulated byuniversal card110. Examples of dynamic magnetic stripes are shown in US Patent Application Publication 2005/0194452, applied for by Nordentoft et al, and 2007/0189581, applied for by Nordentoft et al. In these examples, individually inducible transducer coils are positioned within a universal card and are configurable to emulate the static magnets in a traditional magnetic stripe. The dynamicmagnetic stripe111 of the universal card can be configured to emulate any traditional static magnetic stripe, including any data or data format used by a static magnetic stripe. Thus, even if a data content format is not discussed here, dynamicmagnetic stripe111 would be capable of emulating the data content format not discussed here.
Universal card110 may include abiometric security device118, such as a fingerprint reader, a microphone for voice identification, or other device for input during biometric identification. The use of such biometric identification for security is discussed below.
Referring now toFIG. 3, depicted is a flowchart process for programming a universal card. To initiate power on the universal card (UC) the user may be required to take an action that may include pushing a button on card to turn it “on”, is tapped301, or any other similar technique. The universal card's power is verified302. If the power is not on, the user will repeat the action to initiatepower301 on the universal card again. If the power is on, the universal card and the mobile device are paired303, establishing the short range communication link120 (as shown inFIG. 1). The pairing is verified304, with thepairing303 attempted again if the pairing is not successful. Once paired, an e-wallet application on the mobile device is automatically launched305. If the e-wallet application is not automatically launched306, it can be manually launched307 on the mobile device.
Before allowing access to view, change or modify the financial data associated with thee-wallet program105 on themobile device100 or on theuniversal card110, the user must first be authenticated308. Authentication can take a number of forms. One form of authentication can be verification of something that the user has in their possession. In this context, one security feature could be that themobile device100 can only be paired with oneuniversal card110, and theuniversal card110 will only pair to onemobile device100. For example, if a user'smobile device100 is lost or stolen, theuniversal card110 will not pair with any other mobile device. Thus, any personal card information stored on theuniversal card110 will not be accessible by another mobile device.
Another form of user authentication can be verification of something that the user knows. This can be a personal identification number (PIN), a unique identification of the user (such as a social security number), a fact about the user (such as the maiden name of the user's mother), a password, or anything else that the user can input. Yet another form of user authentication is something about the user. This can include a fingerprint, a voice identification, or other verifiable biometric.
While each of these forms of authentication can alone authenticate the user, it may be desirable to require at least two forms of authentication to ensure increased security. For example, themobile device100 and theuniversal card110 may authenticate each other as being paired; however, this fact alone does not ensure that the person operating the devices is the authentic user. In this case, it may be advantageous to require the user to enter a password to verify that the user is authentic. In some instances, the issuer of the card may impose additional requirement depending on the circumstances that the card is being used. For example, if the card is being used to make a payment over a certain value, if the card is being used in a foreign country, or if the card issuer has reason to suspect that the use of the card is unauthorized, the issuer may require another level of authentication. In this case, if the initial authentication included pairing authentication and a user password, the issuer may require an additional biometric authentication.
Any user input required for authentication can be entered into either theuniversal card110 or themobile device100. Theuniversal card110 may have a user interface (not shown), an optionalbiometric security device118, or other input mechanism which allows the user to input the required value. Similarly themobile device100 may have auser interface104, an optional biometric security device (not shown), or other input mechanism.
Once theuser authentication308 occurs (e.g., a password is entered), the authentication is verified309 (the entered password is verified). If the authentication was not successful,user authentication308 can be attempted again. If the authentication is successful, the user is prompted to select310 an action for programming the universal card.
Notwithstanding the foregoing, it should be clear to a person skilled in the art that radio interfaces120,410,430,450,510, and520 may be subject to eavesdropping or other intrusive information breaches can be protected by data encryption technologies public key, private key and other known and standard methods of radio protection.
The universal card can be programmed in many ways, including three distinct modes. First, the universal card can be programmed in a “dummy card” mode, where the universal card does not itself store any of the information required for emulation of a traditional card. In this case, the user must use the mobile device to program the universal card for each use of the card. Once the universal card is used once as programmed, it would not retain that programmed setting, and it would require re-programming if it were to be used again. Second, the universal card can be programmed in a “temporary card” mode, where the universal card stores only one set of information required for emulation. The user utilizes the mobile device to program the card to emulate a specific card either for a set amount of time or number of transactions. Once programmed in this mode, the universal card would remain programmed to emulate that one card for the set time or the number of transactions. If the user wanted to change the universal card to emulate a different card, the user would need to reconnect the mobile device to reprogram the card. Third, the universal card can be programmed in a “default card” mode, where the universal card always emulates a specific card, unless programmed otherwise. In this mode, the information of the default card is saved in the universal card and the universal card is always configured to emulate the default card, unless the user re-programs the universal card to temporarily act as another card or to change to a new default card.
It may also be possible to program the universal card in different modes for the various ways in which the universal card can be used. For example, a universal card which has both a dynamic magnetic stripe and an NFC transceiver can be used to interface with both magnetic stripe readers and NFC-equipped terminals. The user may use the universal card as a public transportation pass which makes fare payments to an NFC-equipped terminal, and as a credit card with a magnetic stripe reader. In such a case the user may program the NFC transceiver to operate in a “default card” mode, always capable of emulating the public transportation pass, but program the dynamic magnetic stripe in a “dummy card” mode where the user must program the universal card with a specific credit card to emulate before each transaction.
Once the user selects310 an action for programming, the data required for the programming action is determined311. In order for the universal card to be programmed to emulate a magnetic stripe of a payment card, the universal card would need all the data required to be in the dynamic required stripe. The data could include all the information needed to fill Track 1 and Track 2, as discussed above and shown in Tables 1 and 2. The required data may be stored on the mobile device, the universal card, or a remote location such as a trusted service manager. If it is determined312 that the required data is not available, the user is prompted to select310 another action for programming.
If the required data is available, the universal card is programmed314 to emulate the selected card with the required data. If the required data is stored only on the mobile device, theprogramming314 will include transmitting the required data to the universal card via the short range communication link. If the required data is stored on the universal card, theprogramming314 need only include configuring the appropriate device (e.g., dynamic magnetic stripe, short range transceiver, radio transmitter, etc) properly for emulation.
Referring toFIG. 4, depicted are interactions between themobile device100 and theuniversal card110, and between theuniversal card110 and three different types ofterminals400,420, and440. As discussed above, themobile device100 communicates with theuniversal card110 via a short range communications link120 to program theuniversal card110 for emulation of traditional cards. Theuniversal card110, in turn, can communicate withterminals400,420, and440 in a number of ways. It is important to note that, onceuniversal card110 is programmed, the short range communications link120 between themobile device100 and theuniversal card110 need not be established for theuniversal card110 to interact with theterminals400,420, and440.
Terminal400 is equipped with amagnetic stripe reader401 which can read the dynamicmagnetic stripe111 of theuniversal card110 when it is swiped410 through themagnetic stripe reader401. Themagnetic stripe reader401 can read any of the data written to the dynamicmagnetic stripe111.Terminal420 is equipped with ashort range transceiver421 which can establish a shortrange communication link430 between theuniversal card110 and the terminal420. Any required data can be transmitted from theuniversal card110 to the terminal420 via the shortrange communication link430.Terminal440 is equipped with a radio receiver241 which can receive data sent from theradio transmitter117 of theuniversal card110. Any required data can be transmitted from theuniversal card110 to the terminal440 via theradio link450.
One potential problem with thee-wallet software105 on themobile device100 is that large amounts of information may need to be inputted into thee-wallet software105. Theuser interface104 may not be convenient for entry of the large amounts of information. Also, management of the information in thee-wallet software105 may also not be convenient via theuser interface104. To address this issue, apersonal computer500 can be used.
Referring toFIG. 5, depicted is an exemplary system including thepersonal computer500, themobile device100, and theuniversal card110. The personal computer can include aprocessor501,memory502, apower source503, auser interface504, thee-wallet software505, and acommunications port506. Theprocessor501,memory502,power source503, anduser interface504 are all similar in function to the corresponding components of themobile device100, as discussed above. Thee-wallet software505 can be the same or similar toe-wallet software105 of themobile device110. The user may enter data and manage the card data ine-wallet software505 in the same way the user would usee-wallet software105.
When the user enters data or makes changes in the management ofe-wallet software505, thee-wallet software105 on themobile device100 must be updated to reflect the new and/or changed data. In order to make these updates, acommunication link510 can be established between thecommunication port506 of thepersonal computer500 and thecommunication port107 of themobile device100. Thecommunication link510 can be any type of wired or wireless link, including a serial cable, a wired or wireless local area network (LAN), a wired or wireless wide area network (WAN), a short range communication link, a radio link, or any similar connection. Alternatively, acommunication link520 can be established between ashort range transceiver507 of thepersonal computer500 and theshort range transceiver106 of themobile device100.
Once a communication link is established between thepersonal computer500 and themobile device100, the data ine-wallet software505 and thee-wallet software105 can be synchronized. It is important to note that the shortrange communication link120 between theuniversal card110 and themobile device100 need not be active for thelink510 or thelink520 to be established between thepersonal computer500 and themobile device100.
Referring toFIG. 6, depicted is a flowchart process for managing universal card data usingmobile device100. The e-wallet software is launched601 on the mobile device. Before the user is given access to the e-wallet software, the user must first login and be authenticated602. Authentication here can be the same or similar to the forms of authentication discussed above. A determination is made whether the authentication is successful603. If not successful, the user is prompted to login and authenticate602 again. If the authentication is successful, the user is allowed to control604 the e-wallet software a user interface of the mobile device.
Thecontrol604 of the e-wallet software includes anything that the user may need to do to prepare for programming the universal card or to program the universal card. The user can enter data associated with a traditional card or with a financial account. The user can manage the entered data such as by naming a particular account or traditional card, setting a default card, or any other management action needed.
After the user enters data, the data is verified605. The verification can include determining whether sufficient data has been entered for emulation of a traditional card, or whether the data entered matches the data of the card issuer. If the data is not verified, the user is allowed to reenterdata604. If the data is verified, the data is encrypted606 for storage. Encrypting the data for storage is another form of security, as someone that gains access to the encrypted data cannot recover the entered data without knowing how to decrypt the encrypted data. After the data is encrypted, the encrypted data can be stored607 to the mobile device.
Adetermination608 is made as to whether the encrypted data should be uploaded to the personal computer. If the encrypted data will not be uploaded, no further action is required. If the encrypted data will be uploaded to the personal computer, the communication connection between the mobile device and the personal computer is either established or checked609. If the connection to the computer is not verified610, another attempt to establish609 the connection can be attempted. Once the connection to the computer is verified610, the encrypted data can be uploaded and saved611 to the personal computer.
Referring toFIG. 7, depicted is a flowchart process for managing universal card data usingpersonal computer500. Many of the steps are similar to those depicted inFIG. 6. The PC version of the e-wallet software is launched701. The user goes through login andauthentication702 which is verified703. Once the user authentication is verified, the user can control704 the e-wallet software via a user interface of the personal computer. The control on the personal computer is the same as the control on the mobile device, except that the user may prefer to use the user interface of the personal computer to the user interface of the mobile device.
Data entered on the personal computer can be verified705. Once verified, the data is encrypted706 for storage. The encrypted data is stored707 on the personal computer. Adetermination708 is made as to whether the encrypted data should be uploaded to the mobile. If the encrypted data will not be uploaded to the mobile device, the no further action is required. If the encrypted data will be uploaded, the communication connection between the mobile device and the personal computer is either established or checked709. If the connection to the computer is not verified710, another attempt to establish709 the connection can be attempted. Once the connection to the computer is verified710, the encrypted data can be uploaded and saved711 to the mobile device.
The visible sides of a universal card may be designed in a number of ways to provide a user with access to information or components of the universal card.FIG. 8A depicts one design of the front of auniversal card800. The front of theuniversal card800 can have abrand area801 which can be used to identify the brand of the universal card issuer, the brand of a wireless carrier, the brand of a sponsor, any other brand, or any combination of those brands. The front of theuniversal card800 can have the name of thecard holder802 on the face of the card to identify the user. The front of theuniversal card800 can also have adisplay803 which could be used at various times to display an account number, an expiration date, a card issuer logo, any other information, or any combination of these types of information. The front of theuniversal card800 could also include abiometric security reader804, such as a fingerprint reader, which is used to authenticate the user.
FIGS. 8B,8C, and8D depict other possible designs for the front of a universal card.FIG. 8B depicts the front of auniversal card810 which is similar to the front ofuniversal card800, including abrand area811, the name of thecard holder812, adisplay813, and abiometric security reader814. The front of the front of theuniversal card810 can also have anEMV chip815 which is a required component of cards in some markets including some European markets.FIG. 8C depicts the front of auniversal card820 which is similar to the front ofuniversal card800, including abrand area821, the name of thecard holder822, and abiometric security reader824; however, the front ofuniversal card820 does not include a display.FIG. 8B depicts the front of auniversal card830 which similar to the front ofuniversal card800, including abrand area831, the name of thecard holder832, adisplay833, and abiometric security reader834. The front ofuniversal card830 also shows that the name of thecard holder832 and thedisplay833 can be located in various locations on the front of a universal card.
FIG. 9 depicts one design of the back of auniversal card900. The back ofuniversal card900 can include a dynamicmagnetic stripe901 for interacting with a terminal, asignature area902 which displays the signature of the card holder, and abrand area903. Similar to thebrand area801 described above,brand area903 can be used to identify the brand of the universal card issuer, the brand of a wireless carrier, the brand of a sponsor, any other brand, or any combination of those brands.
The various techniques described herein may be implemented with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the disclosed embodiments, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium. When the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the disclosed embodiments. In the case of program code execution on programmable computers, the computer will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device and at least one output device. One or more programs are preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and combined with hardware implementations.
The foregoing description has set forth various embodiments of the apparatus and methods via the use of diagrams and examples. While the present disclosure has been described in connection with the preferred embodiments of the various figures, it is to be understood that other similar embodiments may be used or modifications and additions may be made to the described embodiment for performing the same function of the present disclosure without deviating there from. Therefore, the present disclosure should not be limited to any single embodiment, but rather construed in breadth and scope in accordance with the appended claims. Additional features of this disclosure are set forth in the following claims.

Claims (16)

I claim:
1. A mobile device for instructing a universal card to emulate a traditional card for interacting with a terminal, the traditional card comprising a static data communication mechanism configured to pass card data to the terminal during a transaction, the mobile device comprising:
a first processor, first memory, first power source, and first user interface;
a first short range transceiver configured to connect to the universal card via a short range communication link;
an e-wallet application executable by the first processor and configured to receive, via the first user interface, a user selection for instructing the universal card to emulate the traditional card, wherein the universal card comprises a dynamic data communication mechanism, a second power source, a second processor, a second memory, and a second short range transceiver, and wherein the dynamic data communication mechanism comprises a dynamic magnetic stripe; and
wherein the mobile device is configured to transmit, to the universal card via the short range communication link, the card data and instructions for the universal card to configure the dynamic data communication mechanism, wherein the dynamic communication mechanism emulates the static data communication mechanism of the traditional card using the card data.
2. The mobile device ofclaim 1, wherein the first short range transceiver is a near field communication (NFC) transceiver.
3. The mobile device ofclaim 1, wherein the first short range transceiver is a Bluetooth transceiver.
4. The mobile device ofclaim 1, wherein the instructions comprise instructions for the universal card to configure the dynamic magnetic stripe to emulate a static magnetic stripe of the traditional card.
5. The mobile device ofclaim 1, wherein the instructions comprise instructions for the universal card to configure the second short range transceiver to emulate a short range transmitter of the traditional card.
6. The mobile device ofclaim 1, wherein the dynamic data communication mechanism further comprises a radio communications apparatus, and wherein the instructions comprise instructions for the universal card to configure the radio communications apparatus to emulate a radio communications apparatus of the traditional card.
7. The mobile device ofclaim 4, wherein the dynamic magnetic stripe is configured to pass the card data to a magnetic stripe reader of a terminal.
8. The mobile device ofclaim 5, wherein the second short range transceiver is configured to pass the card data to a third short range transceiver of a terminal.
9. The mobile device ofclaim 6, wherein the radio communications apparatus is configured to pass the card data to a radio receiver of a terminal.
10. The mobile device ofclaim 1, wherein the e-wallet application can be used to manage card data associated with a plurality of traditional cards.
11. The mobile device ofclaim 1, further comprising:
a first communication port configured to communicate with a personal computer via a communication link;
wherein the personal computer comprises:
a second communication port configured to communicate with the mobile device via the communication link, and
a PC e-wallet application configured to receive user inputs to manage the universal card;
wherein the personal computer is configured to transmit the card data to the mobile device via the communication link.
12. The mobile device ofclaim 1, wherein the mobile device is configured to encrypt the card data prior to transmitting the card data to the universal card.
13. A universal card for emulating a traditional card, the traditional card comprising a static data communication mechanism configured to pass card data to a terminal during a transaction, the universal card comprising:
a first short range transceiver configured to communicate with a mobile device via a short range communication link;
a power source, processor, and memory; and
a dynamic data communication mechanism configured to be instructed to emulate the static data communication mechanism of the traditional card to pass the card data to the terminal, wherein the dynamic data communication mechanism comprises a dynamic magnetic stripe;
wherein the universal card is configured to communicate with the mobile device to:
receive the card data from the mobile device, and
receive instructions for the universal card to configure the dynamic data communication mechanism, wherein the dynamic communication mechanism emulates the static data communication mechanism of the traditional card using the card data; and
wherein the universal card is configured to authenticate a user of the universal card before configuring the dynamic data communication mechanism.
14. The universal card ofclaim 13, wherein the dynamic data communication mechanism further comprises one of the following: a second short range transceiver, and a radio communications apparatus.
15. The universal card ofclaim 13, wherein the first short range transceiver is an NFC transceiver or a Bluetooth transceiver.
16. The universal card ofclaim 13, wherein authentication of the user comprises at least one of the following:
verification of an identification of the mobile device;
receipt of a predetermined input from the user;
verification of a biometric characteristic of the user; and
verification that the mobile device and the universal card are in physical proximity sufficient to establish the short range communication link.
US12/715,9772010-03-022010-03-02Portable E-wallet and universal cardExpired - Fee RelatedUS9129270B2 (en)

Priority Applications (12)

Application NumberPriority DateFiling DateTitle
US12/715,977US9129270B2 (en)2010-03-022010-03-02Portable E-wallet and universal card
US13/310,491US8788418B2 (en)2010-03-022011-12-02Portable E-wallet and universal card
US13/359,352US9195926B2 (en)2010-03-022012-01-26Portable e-wallet and universal card
US13/438,131US8671055B2 (en)2010-03-022012-04-03Portable E-wallet and universal card
US13/630,248US9218557B2 (en)2010-03-022012-09-28Portable e-wallet and universal card
US13/644,714US9129199B2 (en)2010-03-022012-10-04Portable E-wallet and universal card
US13/717,363US9177241B2 (en)2010-03-022012-12-17Portable e-wallet and universal card
US13/836,864US9317018B2 (en)2010-03-022013-03-15Portable e-wallet and universal card
US14/157,423US9218598B2 (en)2010-03-022014-01-16Portable e-wallet and universal card
US14/843,865US9734345B2 (en)2010-03-022015-09-02Portable e-wallet and universal card
US15/131,437US9904800B2 (en)2010-03-022016-04-18Portable e-wallet and universal card
US15/842,641US20180114036A1 (en)2010-03-022017-12-14Portable e-wallet and universal card

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US12/715,977US9129270B2 (en)2010-03-022010-03-02Portable E-wallet and universal card

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/310,491Continuation-In-PartUS8788418B2 (en)2010-03-022011-12-02Portable E-wallet and universal card

Publications (2)

Publication NumberPublication Date
US20110218911A1 US20110218911A1 (en)2011-09-08
US9129270B2true US9129270B2 (en)2015-09-08

Family

ID=44532140

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US12/715,977Expired - Fee RelatedUS9129270B2 (en)2010-03-022010-03-02Portable E-wallet and universal card

Country Status (1)

CountryLink
US (1)US9129270B2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110278364A1 (en)*2007-12-242011-11-17Mullen Jeffrey DCards and devices with magnetic emulators and magnetic reader read-head detectors
US20120286928A1 (en)*2011-05-102012-11-15Mullen Jeffrey DSystems and methods for mobile authorizations
US9436941B1 (en)*2015-02-182016-09-06Calay Venture S.à.r.l.Smart payment instruments
US10755248B2 (en)2016-10-112020-08-25Mastercard Asia Pacific Pte. Ltd.Method and device for digital payment transactions
FR3095111A1 (en)2019-04-172020-10-23Madev Tech CONNECTED ELECTRONIC CARD HOLDER AND CARD MANAGEMENT SYSTEM
US11328286B2 (en)2013-03-152022-05-10Cardware, Inc.Multi-function electronic payment card and device system

Families Citing this family (206)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050229003A1 (en)2004-04-092005-10-13Miles PaschiniSystem and method for distributing personal identification numbers over a computer network
US20070198432A1 (en)2001-01-192007-08-23Pitroda Satyan GTransactional services
US10176476B2 (en)2005-10-062019-01-08Mastercard Mobile Transactions Solutions, Inc.Secure ecosystem infrastructure enabling multiple types of electronic wallets in an ecosystem of issuers, service providers, and acquires of instruments
US10205721B2 (en)2002-12-102019-02-12Ewi Holdings, Inc.System and method for distributing personal identification numbers over a computer network
US7131578B2 (en)2003-05-282006-11-07Ewi Holdings, Inc.System and method for electronic prepaid account replenishment
US7280644B2 (en)2004-12-072007-10-09Ewi Holdings, Inc.Transaction processing platform for faciliating electronic distribution of plural prepaid services
US11599873B2 (en)*2010-01-082023-03-07Blackhawk Network, Inc.Systems and methods for proxy card and/or wallet redemption card transactions
US12260396B2 (en)2010-01-082025-03-25Blackhawk Network, Inc.System for payment via electronic wallet
US11475436B2 (en)2010-01-082022-10-18Blackhawk Network, Inc.System and method for providing a security code
US10032160B2 (en)2005-10-062018-07-24Mastercard Mobile Transactions Solutions, Inc.Isolating distinct service provider widgets within a wallet container
US10296895B2 (en)2010-01-082019-05-21Blackhawk Network, Inc.System for processing, activating and redeeming value added prepaid cards
US20100299212A1 (en)*2008-08-272010-11-25Roam Data IncSystem and method for a commerce window application for computing devices
US9230259B1 (en)2009-03-202016-01-05Jpmorgan Chase Bank, N.A.Systems and methods for mobile ordering and payment
US10037526B2 (en)2010-01-082018-07-31Blackhawk Network, Inc.System for payment via electronic wallet
EP2521999A4 (en)2010-01-082015-01-07Blackhawk Network IncA system for processing, activating and redeeming value added prepaid cards
US9195926B2 (en)2010-03-022015-11-24Gonow Technologies, LlcPortable e-wallet and universal card
US9129270B2 (en)2010-03-022015-09-08Gonow Technologies, LlcPortable E-wallet and universal card
US8671055B2 (en)2010-03-022014-03-11Digital Life Technologies, LlcPortable E-wallet and universal card
US8788418B2 (en)*2010-03-022014-07-22Gonow Technologies, LlcPortable E-wallet and universal card
US9129199B2 (en)2010-03-022015-09-08Gonow Technologies, LlcPortable E-wallet and universal card
US9177241B2 (en)2010-03-022015-11-03Gonow Technologies, LlcPortable e-wallet and universal card
US9218557B2 (en)2010-03-022015-12-22Gonow Technologies, LlcPortable e-wallet and universal card
US9317018B2 (en)2010-03-022016-04-19Gonow Technologies, LlcPortable e-wallet and universal card
US20110295748A1 (en)*2010-05-272011-12-01Christopher WoodriffeDigital credit card
US10552809B2 (en)*2010-07-262020-02-04Visa International Service AssociationProgrammable card
CA2809822C (en)2010-08-272023-09-12Blackhawk Network, Inc.Prepaid card with savings feature
US9558481B2 (en)*2010-09-282017-01-31Barclays Bank PlcSecure account provisioning
US20120116964A1 (en)*2010-11-052012-05-10Onbest Technology Holdings LimitedMethod and system of transaction cards management through business network
US9195983B2 (en)2011-04-052015-11-24Roam Data Inc.System and method for a secure cardholder load and storage device
US10580049B2 (en)2011-04-052020-03-03Ingenico, Inc.System and method for incorporating one-time tokens, coupons, and reward systems into merchant point of sale checkout systems
CN103493078B (en)*2011-04-282016-12-07乐天株式会社The control method of billing module, accounting method, accounting device and accounting device
US8538845B2 (en)2011-06-032013-09-17Mozido, LlcMonetary transaction system
US20130173477A1 (en)*2011-08-192013-07-04Geoffrey I. CairnsStoring and forwarding credentials securely from one RFID device to another
CN102958025B (en)*2011-08-242018-01-16中兴通讯股份有限公司Send method, system and the target UE of MTC device triggering information
US10621574B1 (en)2011-09-292020-04-14Raj RaoLinked wallet device system including a plurality of socio-economic interfaces
EP2767110A4 (en)2011-10-122015-01-28C Sam IncA multi-tiered secure mobile transactions enabling platform
US9208488B2 (en)2011-11-212015-12-08Mozido, Inc.Using a mobile wallet infrastructure to support multiple mobile wallet providers
US10438196B2 (en)2011-11-212019-10-08Mozido, Inc.Using a mobile wallet infrastructure to support multiple mobile wallet providers
US8918855B2 (en)*2011-12-092014-12-23Blackberry LimitedTransaction provisioning for mobile wireless communications devices and related methods
US20130191279A1 (en)*2012-01-202013-07-25Bank Of America CorporationMobile device with rewritable general purpose card
WO2013112839A1 (en)*2012-01-262013-08-01Digital Life Technologies LlcPortable e-wallet and universal card
AU2013221323B2 (en)*2012-02-152018-11-08Blackhawk Network, IncSystem and method of registering stored-value cards into electronic wallets
US8763896B2 (en)2012-02-232014-07-01XRomb Inc.System and method of loading a transaction card and processing repayment on a mobile device
US20130262291A1 (en)*2012-03-152013-10-03Flextronics Ap, LlcUniversal credit card
US10304091B1 (en)2012-04-302019-05-28Groupon, Inc.Deal generation using point-of-sale systems and related methods
US10147130B2 (en)2012-09-272018-12-04Groupon, Inc.Online ordering for in-shop service
US10664861B1 (en)2012-03-302020-05-26Groupon, Inc.Generating promotion offers and providing analytics data
US9996859B1 (en)2012-03-302018-06-12Groupon, Inc.Method, apparatus, and computer readable medium for providing a self-service interface
US10304093B2 (en)2013-01-242019-05-28Groupon, Inc.Method, apparatus, and computer readable medium for providing a self-service interface
US10192243B1 (en)2013-06-102019-01-29Groupon, Inc.Method and apparatus for determining promotion pricing parameters
US10255620B1 (en)2013-06-272019-04-09Groupon, Inc.Fine print builder
US10664876B1 (en)2013-06-202020-05-26Groupon, Inc.Method and apparatus for promotion template generation
US11042870B2 (en)*2012-04-042021-06-22Blackhawk Network, Inc.System and method for using intelligent codes to add a stored-value card to an electronic wallet
US11386461B2 (en)2012-04-302022-07-12Groupon, Inc.Deal generation using point-of-sale systems and related methods
US8870081B2 (en)2012-05-292014-10-28Protean Payment, Inc.Payment card and methods
US9406011B2 (en)2012-05-292016-08-02Stratos Technologies, Inc.Virtual wallet
US9064247B2 (en)2012-06-192015-06-23Microsoft Technology Licensing, LlcUser-configurable activation of card applets
US20140006278A1 (en)*2012-06-282014-01-02Ebay Inc.Save to open wallet
US20150220907A1 (en)*2012-07-162015-08-06Mashinery Pty Ltd.Authorization of Transactions
US20140108247A1 (en)2012-10-172014-04-17Groupon, Inc.Peer-To-Peer Payment Processing
US10235692B2 (en)2012-10-172019-03-19Groupon, Inc.Consumer presence based deal offers
AU2013348020B2 (en)2012-11-202019-09-19Blackhawk Network, Inc.System and method for using intelligent codes in conjunction with stored-value cards
US8820649B2 (en)2012-11-202014-09-02Omne Mobile Payments, Inc.Electronic card with a programmable magnetic stripe
US8690059B1 (en)*2013-01-202014-04-08George WallnerSystem and method for a baseband nearfield magnetic stripe data transmitter
US20140229375A1 (en)2013-02-112014-08-14Groupon, Inc.Consumer device payment token management
US9576286B1 (en)2013-03-112017-02-21Groupon, Inc.Consumer device based point-of-sale
US9852409B2 (en)2013-03-112017-12-26Groupon, Inc.Consumer device based point-of-sale
US10482511B1 (en)*2013-03-122019-11-19Groupon, Inc.Employee profile for customer assignment, analytics and payments
US20140279476A1 (en)*2013-03-152014-09-18Visa International Service AssociationMultiple Account Dynamic Card Apparatuses, Methods and Systems
US9275386B2 (en)2013-05-292016-03-01Stratos Technologies, Inc.Method for facilitating payment with a programmable payment card
US9928493B2 (en)2013-09-272018-03-27Groupon, Inc.Systems and methods for providing consumer facing point-of-sale interfaces
WO2015073888A2 (en)2013-11-142015-05-21Protean Payment, Inc.Method for remotely controlling a reprogrammable payment card
US20170337545A1 (en)*2014-11-072017-11-23Tendyron CorporationData interaction method and system
WO2016106277A2 (en)*2014-12-222016-06-30Capital One Services, LLC.A system, method and apparatus for reprogramming a transaction card
EP3238189A4 (en)*2014-12-222018-08-15Capital One Services, LLCA system, method, and apparatus for locating a bluetooth enabled transaction card
US10373169B2 (en)*2015-08-112019-08-06Paypal, Inc.Enhancing information security via the use of a dummy credit card number
CN109923574B (en)*2016-02-292023-12-26第一资本服务有限责任公司Battery-less payment device with wirelessly powered token supply
JP6721435B2 (en)*2016-07-042020-07-15株式会社東芝 IC card, portable electronic device, and information processing method
US11315114B2 (en)2016-12-282022-04-26Capital One Services, LlcDynamic transaction card protected by multi-factor authentication
WO2019145801A1 (en)*2018-01-252019-08-01Gahlaut ShikharA personal electronic card device for conducting financial transactions
US12260397B2 (en)2018-06-192025-03-25Adp, Inc.Single payment validation gateway
US10546444B2 (en)2018-06-212020-01-28Capital One Services, LlcSystems and methods for secure read-only authentication
US11216806B2 (en)2018-09-192022-01-04Capital One Services, LlcSystems and methods for providing card interactions
US10783519B2 (en)2018-10-022020-09-22Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10615981B1 (en)2018-10-022020-04-07Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
KR20250121453A (en)2018-10-022025-08-12캐피탈 원 서비시즈, 엘엘씨Systems and methods for cryptographic authentication of contactless cards
WO2020072413A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10909527B2 (en)2018-10-022021-02-02Capital One Services, LlcSystems and methods for performing a reissue of a contactless card
KR20210065961A (en)2018-10-022021-06-04캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
US10771253B2 (en)2018-10-022020-09-08Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10554411B1 (en)2018-10-022020-02-04Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10771254B2 (en)2018-10-022020-09-08Capital One Services, LlcSystems and methods for email-based card activation
US10685350B2 (en)2018-10-022020-06-16Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072552A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10542036B1 (en)2018-10-022020-01-21Capital One Services, LlcSystems and methods for signaling an attack on contactless cards
US10505738B1 (en)2018-10-022019-12-10Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10607214B1 (en)2018-10-022020-03-31Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10949520B2 (en)2018-10-022021-03-16Capital One Services, LlcSystems and methods for cross coupling risk analytics and one-time-passcodes
US10579998B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10841091B2 (en)2018-10-022020-11-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10565587B1 (en)2018-10-022020-02-18Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10582386B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
KR20210065109A (en)2018-10-022021-06-03캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
US10748138B2 (en)2018-10-022020-08-18Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10992477B2 (en)2018-10-022021-04-27Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072537A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
AU2019355436A1 (en)2018-10-022021-04-15Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10592710B1 (en)2018-10-022020-03-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10581611B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10511443B1 (en)2018-10-022019-12-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10489781B1 (en)2018-10-022019-11-26Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072583A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for establishing identity for order pick up
US11210664B2 (en)2018-10-022021-12-28Capital One Services, LlcSystems and methods for amplifying the strength of cryptographic algorithms
US10664830B1 (en)2018-12-182020-05-26Capital One Services, LlcDevices and methods for selective contactless communication
US20200226581A1 (en)2019-01-112020-07-16Capital One Services, LlcSystems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en)2019-01-242021-06-15Capital One Services, LlcTap to autofill card data
US10467622B1 (en)2019-02-012019-11-05Capital One Services, LlcUsing on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US11120453B2 (en)2019-02-012021-09-14Capital One Services, LlcTap card to securely generate card data to copy to clipboard
US10510074B1 (en)2019-02-012019-12-17Capital One Services, LlcOne-tap payment using a contactless card
US10425129B1 (en)2019-02-272019-09-24Capital One Services, LlcTechniques to reduce power consumption in near field communication systems
US10523708B1 (en)2019-03-182019-12-31Capital One Services, LlcSystem and method for second factor authentication of customer support calls
US10984416B2 (en)2019-03-202021-04-20Capital One Services, LlcNFC mobile currency transfer
US10643420B1 (en)2019-03-202020-05-05Capital One Services, LlcContextual tapping engine
US10438437B1 (en)2019-03-202019-10-08Capital One Services, LlcTap to copy data to clipboard via NFC
US10535062B1 (en)2019-03-202020-01-14Capital One Services, LlcUsing a contactless card to securely share personal data stored in a blockchain
US10970712B2 (en)2019-03-212021-04-06Capital One Services, LlcDelegated administration of permissions using a contactless card
US10467445B1 (en)2019-03-282019-11-05Capital One Services, LlcDevices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en)2019-05-282022-12-06Capital One Services, LlcNFC enhanced augmented reality information overlays
US10516447B1 (en)2019-06-172019-12-24Capital One Services, LlcDynamic power levels in NFC card communications
US11694187B2 (en)2019-07-032023-07-04Capital One Services, LlcConstraining transactional capabilities for contactless cards
US11392933B2 (en)2019-07-032022-07-19Capital One Services, LlcSystems and methods for providing online and hybridcard interactions
US10871958B1 (en)2019-07-032020-12-22Capital One Services, LlcTechniques to perform applet programming
US12086852B2 (en)2019-07-082024-09-10Capital One Services, LlcAuthenticating voice transactions with payment card
US10713649B1 (en)2019-07-092020-07-14Capital One Services, LlcSystem and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en)2019-07-152021-01-05Capital One Services, LlcSystem and method for using image data to trigger contactless card transactions
US10498401B1 (en)2019-07-152019-12-03Capital One Services, LlcSystem and method for guiding card positioning using phone sensors
US10832271B1 (en)2019-07-172020-11-10Capital One Services, LlcVerified reviews using a contactless card
US11182771B2 (en)2019-07-172021-11-23Capital One Services, LlcSystem for value loading onto in-vehicle device
US10733601B1 (en)2019-07-172020-08-04Capital One Services, LlcBody area network facilitated authentication or payment authorization
US11521213B2 (en)2019-07-182022-12-06Capital One Services, LlcContinuous authentication for digital services based on contactless card positioning
US10506426B1 (en)2019-07-192019-12-10Capital One Services, LlcTechniques for call authentication
US10541995B1 (en)2019-07-232020-01-21Capital One Services, LlcFirst factor contactless card authentication system and method
CA3153291A1 (en)2019-10-022021-04-08Evan LernerClient device authentication using contactless legacy magnetic stripe data
US11526887B2 (en)2019-10-232022-12-13Optum, Inc.Transaction authentication using multiple biometric inputs
US10862540B1 (en)2019-12-232020-12-08Capital One Services, LlcMethod for mapping NFC field strength and location on mobile devices
US11615395B2 (en)2019-12-232023-03-28Capital One Services, LlcAuthentication for third party digital wallet provisioning
US11113685B2 (en)2019-12-232021-09-07Capital One Services, LlcCard issuing with restricted virtual numbers
US10733283B1 (en)2019-12-232020-08-04Capital One Services, LlcSecure password generation and management using NFC and contactless smart cards
US11651361B2 (en)2019-12-232023-05-16Capital One Services, LlcSecure authentication based on passport data stored in a contactless card
US10657754B1 (en)2019-12-232020-05-19Capital One Services, LlcContactless card and personal identification system
US10885410B1 (en)2019-12-232021-01-05Capital One Services, LlcGenerating barcodes utilizing cryptographic techniques
US10664941B1 (en)2019-12-242020-05-26Capital One Services, LlcSteganographic image encoding of biometric template information on a card
US10853795B1 (en)2019-12-242020-12-01Capital One Services, LlcSecure authentication based on identity data stored in a contactless card
US11200563B2 (en)2019-12-242021-12-14Capital One Services, LlcAccount registration using a contactless card
US10909544B1 (en)2019-12-262021-02-02Capital One Services, LlcAccessing and utilizing multiple loyalty point accounts
US10757574B1 (en)2019-12-262020-08-25Capital One Services, LlcMulti-factor authentication providing a credential via a contactless card for secure messaging
US11038688B1 (en)2019-12-302021-06-15Capital One Services, LlcTechniques to control applets for contactless cards
US11455620B2 (en)2019-12-312022-09-27Capital One Services, LlcTapping a contactless card to a computing device to provision a virtual number
US10860914B1 (en)2019-12-312020-12-08Capital One Services, LlcContactless card and method of assembly
US11210656B2 (en)2020-04-132021-12-28Capital One Services, LlcDetermining specific terms for contactless card activation
US11222342B2 (en)2020-04-302022-01-11Capital One Services, LlcAccurate images in graphical user interfaces to enable data transfer
US10861006B1 (en)2020-04-302020-12-08Capital One Services, LlcSystems and methods for data access control using a short-range transceiver
US11030339B1 (en)2020-04-302021-06-08Capital One Services, LlcSystems and methods for data access control of personal user data using a short-range transceiver
US11823175B2 (en)2020-04-302023-11-21Capital One Services, LlcIntelligent card unlock
US10915888B1 (en)2020-04-302021-02-09Capital One Services, LlcContactless card with multiple rotating security keys
US10963865B1 (en)2020-05-122021-03-30Capital One Services, LlcAugmented reality card activation experience
US11063979B1 (en)2020-05-182021-07-13Capital One Services, LlcEnabling communications between applications in a mobile operating system
US11100511B1 (en)2020-05-182021-08-24Capital One Services, LlcApplication-based point of sale system in mobile operating systems
US11062098B1 (en)2020-08-112021-07-13Capital One Services, LlcAugmented reality information display and interaction via NFC based authentication
US12165149B2 (en)2020-08-122024-12-10Capital One Services, LlcSystems and methods for user verification via short-range transceiver
US11005302B1 (en)2020-08-312021-05-11Capital One Services, LlcUsing the NFC field from a phone to power card to phone bluetooth communications
US11482312B2 (en)2020-10-302022-10-25Capital One Services, LlcSecure verification of medical status using a contactless card
US11165586B1 (en)2020-10-302021-11-02Capital One Services, LlcCall center web-based authentication using a contactless card
US11373169B2 (en)2020-11-032022-06-28Capital One Services, LlcWeb-based activation of contactless cards
US11216799B1 (en)2021-01-042022-01-04Capital One Services, LlcSecure generation of one-time passcodes using a contactless card
US11682012B2 (en)2021-01-272023-06-20Capital One Services, LlcContactless delivery systems and methods
US11562358B2 (en)2021-01-282023-01-24Capital One Services, LlcSystems and methods for near field contactless card communication and cryptographic authentication
US11687930B2 (en)2021-01-282023-06-27Capital One Services, LlcSystems and methods for authentication of access tokens
US11792001B2 (en)2021-01-282023-10-17Capital One Services, LlcSystems and methods for secure reprovisioning
US11438329B2 (en)2021-01-292022-09-06Capital One Services, LlcSystems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en)2021-02-032023-10-03Capital One Services, LlcURL-based authentication for payment cards
US11637826B2 (en)2021-02-242023-04-25Capital One Services, LlcEstablishing authentication persistence
US11245438B1 (en)2021-03-262022-02-08Capital One Services, LlcNetwork-enabled smart apparatus and systems and methods for activating and provisioning same
US12143515B2 (en)2021-03-262024-11-12Capital One Services, LlcSystems and methods for transaction card-based authentication
US12160419B2 (en)2021-04-152024-12-03Capital One Services, LlcAuthenticated messaging session with contactless card authentication
US11961089B2 (en)2021-04-202024-04-16Capital One Services, LlcOn-demand applications to extend web services
US11935035B2 (en)2021-04-202024-03-19Capital One Services, LlcTechniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en)2021-04-222024-02-13Capital One Services, LlcSecure management of accounts on display devices using a contactless card
US11354555B1 (en)2021-05-042022-06-07Capital One Services, LlcMethods, mediums, and systems for applying a display to a transaction card
US12301735B2 (en)2021-06-182025-05-13Capital One Services, LlcSystems and methods for contactless card communication and multi-device key pair cryptographic authentication
US12335412B2 (en)2021-06-212025-06-17Capital One Services, LlcSystems and methods for scalable cryptographic authentication of contactless cards
US12041172B2 (en)2021-06-252024-07-16Capital One Services, LlcCryptographic authentication to control access to storage devices
US12061682B2 (en)2021-07-192024-08-13Capital One Services, LlcSystem and method to perform digital authentication using multiple channels of communication
US12062258B2 (en)2021-09-162024-08-13Capital One Services, LlcUse of a payment card to unlock a lock
US12069173B2 (en)2021-12-152024-08-20Capital One Services, LlcKey recovery based on contactless card authentication
US12166750B2 (en)2022-02-082024-12-10Capital One Services, LlcSystems and methods for secure access of storage
US12354077B2 (en)2022-06-232025-07-08Capital One Services, LlcMobile web browser authentication and checkout using a contactless card
US12354104B2 (en)2022-08-092025-07-08Capital One Services, LlcMethods and arrangements for proof of purchase
US12289396B2 (en)2022-08-182025-04-29Capital One Services, LlcParallel secret salt generation and authentication for encrypted communication
US12147983B2 (en)2023-01-132024-11-19Capital One Services, LlcSystems and methods for multi-factor authentication using device tracking and identity verification
US12248832B2 (en)2023-03-072025-03-11Capital One Services, LlcSystems and methods for steganographic image encoding and identity verification using same
US12335256B2 (en)2023-03-082025-06-17Capital One Services, LlcSystems and methods for device binding authentication
US12248928B2 (en)2023-03-132025-03-11Capital One Services, LlcSystems and methods of secure merchant payment over messaging platform using a contactless card
US12124903B2 (en)2023-03-162024-10-22Capital One Services, LlcCard with a time-sensitive element and systems and methods for implementing the same
US12299672B2 (en)2023-03-302025-05-13Capital One Services, LlcSystem and method for authentication with transaction cards
US12200135B2 (en)2023-06-132025-01-14Capital One Services, LlcContactless card-based authentication via web-browser

Citations (60)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4491725A (en)1982-09-291985-01-01Pritchard Lawrence EMedical insurance verification and processing system
US4689478A (en)1984-12-241987-08-25Ncr CorporationSystem for handling transactions including a portable personal terminal
US5276311A (en)1989-03-011994-01-04Hartmut HennigeMethod and device for simplifying the use of a plurality of credit cards, or the like
US5590038A (en)1994-06-201996-12-31Pitroda; Satyan G.Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions
US5594493A (en)1994-01-191997-01-14Nemirofsky; Frank R.Television signal activated interactive smart card system
US5748737A (en)1994-11-141998-05-05Daggar; Robert N.Multimedia electronic wallet with generic card
US5939699A (en)1997-05-281999-08-17Motorola, Inc.Bar code display apparatus
US6131811A (en)*1998-05-292000-10-17E-Micro CorporationWallet consolidator
US6161005A (en)1998-08-102000-12-12Pinzon; Brian W.Door locking/unlocking system utilizing direct and network communications
US6336098B1 (en)1997-12-112002-01-01International Business Machines Corp.Method for electronic distribution and redemption of coupons on the world wide web
US20020004746A1 (en)2000-04-172002-01-10Ferber John B.E-coupon channel and method for delivery of e-coupons to wireless devices
US20020198777A1 (en)2001-05-312002-12-26Kei YuasaElectronic coupon method and system
US20030055785A1 (en)2001-09-202003-03-20International Business Machines CorporationSystem and method for electronic wallet transactions
US6607136B1 (en)1998-09-162003-08-19Beepcard Inc.Physical presence digital authentication system
US20030166400A1 (en)2001-08-132003-09-04Stephen LucasMethod and apparatus for electronic data sharing
US6617975B1 (en)1998-04-162003-09-09James P. BurgessKeyless entry system for vehicles in particular
US6641050B2 (en)2001-11-062003-11-04International Business Machines CorporationSecure credit card
US20040019564A1 (en)2002-07-262004-01-29Scott GoldthwaiteSystem and method for payment transaction authentication
US6718240B1 (en)2002-08-282004-04-06Honda Giken Kogyo Kabushiki KaishaRemote keyless entry system
US6715679B1 (en)1999-09-082004-04-06At&T Corp.Universal magnetic stripe card
US6736322B2 (en)2000-11-202004-05-18Ecrio Inc.Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device
US6769607B1 (en)1999-11-152004-08-03Satyan G. PitrodaPoint of sale and display adapter for electronic transaction device
US20040159700A1 (en)*2001-12-262004-08-19Vivotech, Inc.Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device
US6785595B2 (en)2002-02-132004-08-31Honda Giken Kogyo Kabushiki KaishaElectronic control system for vehicle accessory devices
US20050021400A1 (en)1999-06-232005-01-27Richard PostrelMethod and system for using multi-function cards for storing, managing and aggregating reward points
US20050101314A1 (en)2003-11-102005-05-12Uri LeviMethod and system for wireless group communications
US20050116026A1 (en)1999-09-282005-06-02Chameleon Network, Inc.Portable electronic authorization system and method
US6925439B1 (en)1994-06-202005-08-02C-Sam, Inc.Device, system and methods of conducting paperless transactions
US20050173519A1 (en)1995-04-132005-08-11Gatto James G.Electronic fund transfer or transaction system
US20050194452A1 (en)2004-03-082005-09-08Torsten NordentoftCredit card and a secured data activation system
US6967562B2 (en)2002-02-222005-11-22Royal Thoughts, LlcElectronic lock control and sensor module for a wireless system
US20060081702A1 (en)2003-01-272006-04-20Gopal NandakumarSystem and method for universal consumer cards
US20060190412A1 (en)2000-02-112006-08-24Maurice OstroffMethod and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US7097108B2 (en)2004-10-282006-08-29Bellsouth Intellectual Property CorporationMultiple function electronic cards
US7128274B2 (en)2005-03-242006-10-31International Business Machines CorporationSecure credit card with near field communications
US7152783B2 (en)*2001-07-102006-12-26Smart Card Integrators, Inc.Combined card reader and bill acceptor
US20070045401A1 (en)2005-08-232007-03-01Kenneth SturmRetail package for prepaid debit cards and method for debit card distribution
WO2007028634A1 (en)2005-09-082007-03-15Cardlab ApsA dynamic transaction card and a method of writing information to the same
US7213742B1 (en)2003-03-202007-05-08Convergys Information Management Group, Inc.System and method for value creation
US20070252010A1 (en)2006-04-272007-11-01Carlos GonzalezCredit Card Sized USB Flash Drive
US20070254712A1 (en)*2006-04-282007-11-01Sriram ChittiMobile commerce method and device
US20070278291A1 (en)2005-12-222007-12-06Rans Jean-Paul EMethods and Systems for Two-Factor Authentication Using Contactless Chip Cards or Devices and Mobile Devices or Dedicated Personal Readers
US20070288313A1 (en)2006-06-092007-12-13Mark BrodsonE-Coupon System and Method
US20080059379A1 (en)2006-05-182008-03-06Icache, Inc.Method and apparatus for biometrically secured encrypted data storage and retrieval
US7343317B2 (en)2001-01-182008-03-11Nokia CorporationReal-time wireless e-coupon (promotion) definition based on available segment
US20080147546A1 (en)2006-09-192008-06-19Walter WeichselbaumerWireless device electronic wallet transaction validation
US7499889B2 (en)2000-10-232009-03-03Cyota Inc.Transaction system
US20090103732A1 (en)2007-10-232009-04-23Inside ContactlessMethod of personalizing a NFC Chipset
US20090199206A1 (en)2006-06-122009-08-06Klaus FinkenzellerData storage medium and method for contactless communication between the data storage medium and a reader
US7591416B2 (en)2000-12-062009-09-22Jpmorgan Chase Bank, N.A.Selectable multi-purpose card
US20090261166A1 (en)2008-02-232009-10-22Cedar Ridge Research LlcSystem and method for data card emulation
US20100057580A1 (en)2008-08-282010-03-04Radha RaghunathanUnified payment card
US20100280948A1 (en)1998-03-302010-11-04Cohen Morris ESystems for Financial and Electronic Commerce
US20110062242A1 (en)2008-03-312011-03-17The Royal Bank Of Scotland PlcProcessor card arrangement
US20110140841A1 (en)2008-08-202011-06-16X-Card Holdings, LlcSecure smart card system
US20110219026A1 (en)2008-11-042011-09-08Bo SchonemannMethod and system for distributing information relating to a piece of music and/or a movie/video
US20110218911A1 (en)2010-03-022011-09-08Douglas SpodakPortable e-wallet and universal card
US8082575B2 (en)2002-03-282011-12-20Rampart-Id Systems, Inc.System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe
US8200582B1 (en)2009-01-052012-06-12Sprint Communications Company L.P.Mobile device password system
US8326758B2 (en)2007-08-062012-12-04Enpulz, L.L.C.Proxy card representing many monetary sources from a plurality of vendors

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7681252B1 (en)*2007-01-242010-03-23Petry Robert WMoisture-diverting sweatband

Patent Citations (66)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4491725A (en)1982-09-291985-01-01Pritchard Lawrence EMedical insurance verification and processing system
US4689478A (en)1984-12-241987-08-25Ncr CorporationSystem for handling transactions including a portable personal terminal
US5276311A (en)1989-03-011994-01-04Hartmut HennigeMethod and device for simplifying the use of a plurality of credit cards, or the like
US5594493A (en)1994-01-191997-01-14Nemirofsky; Frank R.Television signal activated interactive smart card system
US5884271A (en)1994-06-201999-03-16Pitroda; Satyan G.Device, system and methods of conducting paperless transactions
US5590038A (en)1994-06-201996-12-31Pitroda; Satyan G.Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions
US6925439B1 (en)1994-06-202005-08-02C-Sam, Inc.Device, system and methods of conducting paperless transactions
US5748737A (en)1994-11-141998-05-05Daggar; Robert N.Multimedia electronic wallet with generic card
US20050173519A1 (en)1995-04-132005-08-11Gatto James G.Electronic fund transfer or transaction system
US5939699A (en)1997-05-281999-08-17Motorola, Inc.Bar code display apparatus
US6336098B1 (en)1997-12-112002-01-01International Business Machines Corp.Method for electronic distribution and redemption of coupons on the world wide web
US20100280948A1 (en)1998-03-302010-11-04Cohen Morris ESystems for Financial and Electronic Commerce
US6617975B1 (en)1998-04-162003-09-09James P. BurgessKeyless entry system for vehicles in particular
US6131811A (en)*1998-05-292000-10-17E-Micro CorporationWallet consolidator
US6161005A (en)1998-08-102000-12-12Pinzon; Brian W.Door locking/unlocking system utilizing direct and network communications
US6607136B1 (en)1998-09-162003-08-19Beepcard Inc.Physical presence digital authentication system
US20050021400A1 (en)1999-06-232005-01-27Richard PostrelMethod and system for using multi-function cards for storing, managing and aggregating reward points
US6715679B1 (en)1999-09-082004-04-06At&T Corp.Universal magnetic stripe card
US20050116026A1 (en)1999-09-282005-06-02Chameleon Network, Inc.Portable electronic authorization system and method
US7003495B1 (en)1999-09-282006-02-21Chameleon Network Inc.Portable electronic authorization system and method
US6769607B1 (en)1999-11-152004-08-03Satyan G. PitrodaPoint of sale and display adapter for electronic transaction device
US20060190412A1 (en)2000-02-112006-08-24Maurice OstroffMethod and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US20020004746A1 (en)2000-04-172002-01-10Ferber John B.E-coupon channel and method for delivery of e-coupons to wireless devices
US7499889B2 (en)2000-10-232009-03-03Cyota Inc.Transaction system
US6736322B2 (en)2000-11-202004-05-18Ecrio Inc.Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device
US7591416B2 (en)2000-12-062009-09-22Jpmorgan Chase Bank, N.A.Selectable multi-purpose card
US20080120186A1 (en)2001-01-182008-05-22Nokia CorporationReal-Time Wireless E-Coupon (Promotion) Definition Based on Available Segment
US7343317B2 (en)2001-01-182008-03-11Nokia CorporationReal-time wireless e-coupon (promotion) definition based on available segment
US20020198777A1 (en)2001-05-312002-12-26Kei YuasaElectronic coupon method and system
US7152783B2 (en)*2001-07-102006-12-26Smart Card Integrators, Inc.Combined card reader and bill acceptor
US20030166400A1 (en)2001-08-132003-09-04Stephen LucasMethod and apparatus for electronic data sharing
US20030055785A1 (en)2001-09-202003-03-20International Business Machines CorporationSystem and method for electronic wallet transactions
US6641050B2 (en)2001-11-062003-11-04International Business Machines CorporationSecure credit card
US20040159700A1 (en)*2001-12-262004-08-19Vivotech, Inc.Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device
US6785595B2 (en)2002-02-132004-08-31Honda Giken Kogyo Kabushiki KaishaElectronic control system for vehicle accessory devices
US6967562B2 (en)2002-02-222005-11-22Royal Thoughts, LlcElectronic lock control and sensor module for a wireless system
US8082575B2 (en)2002-03-282011-12-20Rampart-Id Systems, Inc.System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe
US20040019564A1 (en)2002-07-262004-01-29Scott GoldthwaiteSystem and method for payment transaction authentication
US6718240B1 (en)2002-08-282004-04-06Honda Giken Kogyo Kabushiki KaishaRemote keyless entry system
US20060081702A1 (en)2003-01-272006-04-20Gopal NandakumarSystem and method for universal consumer cards
US7213742B1 (en)2003-03-202007-05-08Convergys Information Management Group, Inc.System and method for value creation
US20050101314A1 (en)2003-11-102005-05-12Uri LeviMethod and system for wireless group communications
US20070189581A1 (en)2004-03-082007-08-16Torsten NordentoftCredit card and a secured data activation system
WO2005086102A1 (en)2004-03-082005-09-15Cardlab ApsA credit card and a secured data activation system
US20050194452A1 (en)2004-03-082005-09-08Torsten NordentoftCredit card and a secured data activation system
US7681232B2 (en)2004-03-082010-03-16Cardlab ApsCredit card and a secured data activation system
US7097108B2 (en)2004-10-282006-08-29Bellsouth Intellectual Property CorporationMultiple function electronic cards
US7128274B2 (en)2005-03-242006-10-31International Business Machines CorporationSecure credit card with near field communications
US20070045401A1 (en)2005-08-232007-03-01Kenneth SturmRetail package for prepaid debit cards and method for debit card distribution
WO2007028634A1 (en)2005-09-082007-03-15Cardlab ApsA dynamic transaction card and a method of writing information to the same
US20070278291A1 (en)2005-12-222007-12-06Rans Jean-Paul EMethods and Systems for Two-Factor Authentication Using Contactless Chip Cards or Devices and Mobile Devices or Dedicated Personal Readers
US20070252010A1 (en)2006-04-272007-11-01Carlos GonzalezCredit Card Sized USB Flash Drive
US20070254712A1 (en)*2006-04-282007-11-01Sriram ChittiMobile commerce method and device
US20080059379A1 (en)2006-05-182008-03-06Icache, Inc.Method and apparatus for biometrically secured encrypted data storage and retrieval
US20070288313A1 (en)2006-06-092007-12-13Mark BrodsonE-Coupon System and Method
US20090199206A1 (en)2006-06-122009-08-06Klaus FinkenzellerData storage medium and method for contactless communication between the data storage medium and a reader
US20080147546A1 (en)2006-09-192008-06-19Walter WeichselbaumerWireless device electronic wallet transaction validation
US8326758B2 (en)2007-08-062012-12-04Enpulz, L.L.C.Proxy card representing many monetary sources from a plurality of vendors
US20090103732A1 (en)2007-10-232009-04-23Inside ContactlessMethod of personalizing a NFC Chipset
US20090261166A1 (en)2008-02-232009-10-22Cedar Ridge Research LlcSystem and method for data card emulation
US20110062242A1 (en)2008-03-312011-03-17The Royal Bank Of Scotland PlcProcessor card arrangement
US20110140841A1 (en)2008-08-202011-06-16X-Card Holdings, LlcSecure smart card system
US20100057580A1 (en)2008-08-282010-03-04Radha RaghunathanUnified payment card
US20110219026A1 (en)2008-11-042011-09-08Bo SchonemannMethod and system for distributing information relating to a piece of music and/or a movie/video
US8200582B1 (en)2009-01-052012-06-12Sprint Communications Company L.P.Mobile device password system
US20110218911A1 (en)2010-03-022011-09-08Douglas SpodakPortable e-wallet and universal card

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
AT & T joins banks in Mondex line-up: Anonymus. Financial Technology International Bulletin 13.12 (Aug. 1996): 1.
International Patent Application No. PCT/US2011/63319: International Search Report and Written Opinion dated Apr. 25, 2012, 15 pages.
International Patent Application No. PCT/US2013/023149: International Search Report and Written Opinion dated Jun. 5, 2013, 40 pages.
Smart cards Do not have all the answers: Motoco Rich and Gerge Graham Financial Times. Fianancial Post[Toronto,ont] Aug. 27, 1996:53.
Smart cards: Anonymus; Retail Delivery strategies 9 (1998):5-27.

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110278364A1 (en)*2007-12-242011-11-17Mullen Jeffrey DCards and devices with magnetic emulators and magnetic reader read-head detectors
US20120286928A1 (en)*2011-05-102012-11-15Mullen Jeffrey DSystems and methods for mobile authorizations
US11100431B2 (en)*2011-05-102021-08-24Dynamics Inc.Systems and methods for mobile authorizations
US11328286B2 (en)2013-03-152022-05-10Cardware, Inc.Multi-function electronic payment card and device system
US9436941B1 (en)*2015-02-182016-09-06Calay Venture S.à.r.l.Smart payment instruments
US10755248B2 (en)2016-10-112020-08-25Mastercard Asia Pacific Pte. Ltd.Method and device for digital payment transactions
FR3095111A1 (en)2019-04-172020-10-23Madev Tech CONNECTED ELECTRONIC CARD HOLDER AND CARD MANAGEMENT SYSTEM

Also Published As

Publication numberPublication date
US20110218911A1 (en)2011-09-08

Similar Documents

PublicationPublication DateTitle
US9129270B2 (en)Portable E-wallet and universal card
US8788418B2 (en)Portable E-wallet and universal card
US9129199B2 (en)Portable E-wallet and universal card
US8671055B2 (en)Portable E-wallet and universal card
US9218557B2 (en)Portable e-wallet and universal card
US9177241B2 (en)Portable e-wallet and universal card
US9904800B2 (en)Portable e-wallet and universal card
US9195926B2 (en)Portable e-wallet and universal card
US11657384B2 (en)Apparatus and method for emulating transactional infrastructure with a digital transaction processing unit (DTPU)
US10552809B2 (en)Programmable card
US7357309B2 (en)EMV transactions in mobile terminals
US9010646B2 (en)Optical contact loaded magnetic card
EP2807600A1 (en)Portable e-wallet and universal card
TW202105281A (en)Application selection on a digital transaction processing unit
CN101467158A (en)System and method for activating a phone-based payment instrument

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:DIGITAL LIFE TECHNOLOGIES, LLC, PENNSYLVANIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPODAK, DOUGLAS;REEL/FRAME:024123/0281

Effective date:20100302

ASAssignment

Owner name:LERNER, STEVEN, NEW JERSEY

Free format text:SECURITY INTEREST;ASSIGNORS:DIGITAL LIFE TECHNOLOGIES, LLC;SPODAK, DOUGLAS;REEL/FRAME:026516/0925

Effective date:20110520

ASAssignment

Owner name:DIGITAL LIFE TECHNOLOGIES, LLC, PENNSYLVANIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:LERNER, STEVEN;REEL/FRAME:028143/0224

Effective date:20120427

ASAssignment

Owner name:GONOW TECHNOLOGIES, LLC, PENNSYLVANIA

Free format text:CHANGE OF NAME;ASSIGNOR:DIGITAL LIFE TECHNOLOGIES LLC;REEL/FRAME:032386/0183

Effective date:20130701

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPExpired due to failure to pay maintenance fee

Effective date:20190908


[8]ページ先頭

©2009-2025 Movatter.jp